Bibliography
- Airbus, ‘The Eye of the Tiger’, 11 Jul. 2014. http://blog.airbuscybersecurity.com/post/2014/07/The-Eye-of-the-Tiger2
- Alperovitch, Dmitri, ‘Revealed: Operation Shady RAT’, McAfee. http://www.csri.info/wp-content/uploads/2012/08/wp-operation-shady-rat1.pdf
- Arquilla, John, ‘Rebuttal Cyberwar Is Already Upon Us’, Foreign Policy, Mar/Apr 2012. 192; ProQuest pp. 84 doi:https://doi.org/10.1094/PDIS11-11-0999-PDN.
- Arquilla, John and David Ronfeldt, ‘Cyberwar Is Coming!’ Comparative Strategy 12/2 (1993), 141–65. doi:https://doi.org/10.1080/01495939308402915.
- Arquilla, John and David Ronfeldt, Networks and Netwars: The Future of Terror, Crime, and Militancy (Santa Monica: Rand Corporation 2001).
- Arquilla, John and David Ronfeldt, In Athena’s Camp: Preparing for Conflict in the Information Age (Santa Monica: The Rand Corporation 1997).
- Barnett, Micael and Raymond Duval, ‘Power in International Politics’, International Organization 59/1 (2005), 39–75. doi:https://doi.org/10.1017/S0020818305050010.
- Baumgartner, Kurt and Maxim Golovkin, ‘The Naikon APT’, SecureList, 14 May 2015. https://securelist.com/the-naikon-apt/69953/
- Bendrath, Ralf, ‘The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection’, Information & Security 7 (2001), 80–103.
- Bendrath, Ralf, ‘The American Cyber-angst and the Real World - Any Link?’, Paper presented at: International Studies Association Annual Convention, University of Bremen, Montreal, QC, 2004
- Betz, David J. and Tim Stevens, ‘Cyberspace and the State: Towards a Strategy for Cyber-Power’, Adelphi Series 51/424 (2011), 75–98. doi:https://doi.org/10.1080/19445571.2011.636956.
- Blair, Dennis C., ‘Annual Threat Assessment of the U.S. Intelligence Community for the Senate Select Committee on Intelligence’, 2 Feb. 2010. https://www.dni.gov/files/documents/Newsroom/Testimonies/20100202_testimony.pdf
- Borghard, Erica D. and Shawn W. Lonegran, ‘The Logic of Coercion in Cyberspace’, Security Studies 26/3 (2017), 452–81. doi:https://doi.org/10.1080/09636412.2017.1306396.
- Boulding, Kenneth, E, Conflict and Defense: A General Theory (New York: Harper and Brothers 1962), 79, 230–231.
- Broad, Willaim J. and David E. Sanger, ‘U.S. strategy to Hobble North Korea was Hidden in plain sight’, New York Times, 4 Mar. 2017. https://www.nytimes.com/2017/03/04/world/asia/left-of-launch-missile-defense.html
- Carson, Austin, Secret Wars: Covert Conflict in International Politics (Princeton: Princeton University Press 2018).
- Carter, Ashton, ‘A Lasting Defeat: The Campaign to Destroy ISIS’, Report, Oct. (Belfer Center for Science and International Affairs, Harvard Kennedy School 2017). https://www.belfercenter.org/LastingDefeat
- Cavelty, Myriam Dunn, Cyber-Security and Threat Politics US Efforts to Secure in the Information Age (Abingdon: Routledge 2008).
- CBS News, ‘Stuxnet: Computer worm opens new era of warfare’, 60 Minutes,4 Mar. 2012. doi:https://doi.org/10.1094/PDIS11-11-0999-PDN.
- Cheung, Tai Ming, Fortifying China: The Struggle to Build a Modern Defense Economy (Ithaca, NY: Cornell UP 2009).
- Clarke, Richard A. and Robert K. Knake, Cyber War (New York: Ecco 2010).
- Cluley, Graham, ‘Targeted trident cyber-attack against defence company’, Naked Security, Jun.. https://nakedsecurity.sophos.com/2010/06/24/targeted-trident-cyberattack-defence-company/
- Coats, Daniel R., ‘Statement for the Record: Worldwide Threat Assessment of the U.S. Intelligence Community Feb. 13, 2018. https://www.dni.gov/files/documents/Newsroom/Testimonies/2018-ATA—Unclassified-SSCI.pdf
- Collins, Sean and Stephen McCombie, ‘Stuxnet: The Emergence of a New Cyber Weapon and Its Implications’, Journal of Policing, Intelligence, and Counter Terrorism 7/1 (2012), 80–91. doi:https://doi.org/10.1080/18335330.2012.653198.
- Constantin, Lucian, ‘Kill Timer found in Shamoon Malware suggests possible connection to Saudi Aramco Attack’, Computerworld, 23 Aug. 2012. http://www.computerworld.com/article/2491501/malware-vulnerabilities/kill-timer-found-in-shamoon-malware-suggests-possible-connection-to-saudi-ar.html
- Costello, John, ‘Panel I: Structure, Reforms, and Capabilities of Chinese Intelligence Services’, U.S. –China Economic and Security Review Commission, 9 Jun. 2016. https://www.uscc.gov/sites/default/files/transcripts/June%2009,%202016%20Hearing%20Transcript.pdf
- Costello, John, ‘Statement on China’s Intelligence Services and Espionage Operations,’ before the U.S.-China Economic and Security Review Commission’, 9 Jun. 2016. https://www.uscc.gov/sites/default/files/transcripts/June%2009%2C%202016%20Hearing%20Transcript.pdf
- Counter Threat Unit Research Team, ‘Threat Group-0110 Targets Manufacturing and Financial Organizations via Phishing’, Secureworks, 25 Jul. 2014. https://www.secureworks.com/blog/threat-group-0110-targets-manufacturing-and-financial-organizations-via-phishing
- Department of Defense, ‘Cyberspace Operations’, Joint Publication 3-12(R), Feb. (2013)
- Deibert, Ronald J., ‘Cyclone in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War’, Security Dialogue 43 (2012), 3–24. doi:https://doi.org/10.1177/0967010611431079.
- Denning, Dorothy E., ‘Stuxnet: What Has Changed?’, Future Internet 4 (2012), 672–87. doi:https://doi.org/10.3390/fi4030672.
- Denning, Dorothy E., ‘Rethinking the Cyber Domain and Deterrence’, Joint Force Quarterly, 1 Apr. 2015, pp. 77. http://ndupress.ndu.edu/Publications/Article/581864/rethinking-the-cyber-domain-and-deterrence/
- Editorial Board, ‘The U.S. must take action to stop Chinese Industrial Espionage’, The Washington Post, 4 Nov. 2018. https://www.washingtonpost.com/opinions/the-us-must-take-action-to-stop-chinese-industrial-espionage/2018/11/04/66ccd5a6-ded2-11e8-b3f0-62607289efee_story.html?noredirect=on&utm_term=.b34bf6a75420
- Eneken, Tikk, Kadri Kaska and Liis Vihul, ‘International Cyber Incidents: Estonia 2007’, (Tallinn: NATO CCDCOE 2010) 14–25, 33; in Ottis eds., ‘Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective’, Proceedings of the 7th European Conference on Information Warfare and Security (Plymouth: Academic Publishing Limited 2008).
- Eng, Erica and Dan Caselden, ‘Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign’, FireEye, 23 Jun. 2015. https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html
- Erdbrink, Thomas, ‘Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals From Internet’, The New York Times, 23 Apr. 2012. https://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html
- Farley, Robert, ‘From the dreadnought to modern stealth: Seeking military technological superiority’, The Diplomat, 11 Mar. 2019. https://thediplomat.com/2019/03/from-the-dreadnought-to-modern-stealth-seeking-military-technological-superiority/
- Farley, Robert, ‘Intellectual property, defense technology, and the future of great power relations’, The Diplomat, 14 Mar. 2019. https://thediplomat.com/2019/03/intellectual-property-defense-technology-and-the-future-of-great-power-relations/
- Farley, Robert, ‘Is China’s path to military parity with the US through intellectual property theft doomed?’, The Diplomat, 8 Mar. 2019. https://thediplomat.com/2019/03/is-chinas-path-to-military-parity-with-the-us-through-intellectual-property-theft-doomed/
- Farwell, James P. and Rafal Rohozinski, ‘Stuxnet and the Future of Cyber War’, Survival: Global Politics and Strategy 53/1 (2011), 23–40. doi:https://doi.org/10.1080/00396338.2011.555586.
- FireEye, ‘Supply Chain Analysis: From Quartermaster to Sunshop’, 2014. https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-malware-supply-chain.pdf
- FireEye, ‘APT 30 and the Mechanics of a Long-Running Cyber Espionage Operation’, 2015. https://www.fireeye.com/blog/threat-research/2015/04/apt_30_and_the_mecha.html
- Florian Egloff, ‘Cybersecurity and Non-State Actors: A Historical Analogy with Mercantile Companies, Privateers, and Pirates’, DPhil Thesis, University of Oxford, 2018
- Fruhlinger, Josh, ‘Petya Ransomware and NotPetya Malware: What You Need to Know Now’, CSO, 17 Oct. 2017. https://www.csoonline.com/article/3233210/ransomware/petya-ransomware-and-notpetya-malware-what-you-need-to-know-now.html
- Gabi, Siboni and Sami Kronenfeld, ‘Iran and Cyberspace Warfare’, Military and Strategic Affairs 4/3 (2012), 101–17.
- Gardels, Nathan, ‘Mike McConnell: An American Spymaster on Cyberwar’, Huffpost, 8 Aug. 2009. https://www.huffingtonpost.com/nathan-gardels/mike-mcconnell-an-america_b_227944.html
- Gartzke, Erik, ‘The Myth of Cyberwar: Bringing War in Cyberspace Back down to Earth’, International Security 38/2 (2013), 41–73. doi:https://doi.org/10.1162/ISEC_a_00136.
- Gilli, Andrea and Mauro Gilli, ‘Why China Has Not Caught up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage’, International Security 43/3 (2019), 141–89. doi:https://doi.org/10.1162/isec_a_00337.
- Goodin, Dan, ‘DoS Attacks that Took down Big Game Sites Abused Web’s Time-sync Protocol’, Ars Technica, 8 Jan. 2014. https://arstechnica.com/information-technology/2014/01/dos-attacks-that-took-down-big-game-sites-abused-webs-time-synch-protocol/
- Greenberg, Andy, ‘The Untold Story of NotPetya, the Most Devastating Cyberattack in History’, Wired, 22 Aug. 2018. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
- Gross, Michael Joseph, ‘A declaration of cyber-war’, Vanity Fair, Apr. 2011.
- Guerrero-Saade, Juan Andres, Costin Raiu, Daniel Moore and Thomas Rid, ‘Penquin’s Moonlit Maze: The Dawn of Nation-State Digital Espionage’, Kaspersky Lab, 2018. https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180251/Penquins_Moonlit_Maze_PDF_eng.pdf
- Hannas, Wiliam C., James Mulvenon and Anna B. Puglisi, Chinese Industrial Espionage: Technology Acquisition and Military Modernization Asian Security Studies (Abingdon: Routledge 2013).
- Harknett, Richard., ‘State Preferences, Systemic Constraints, and the Absolute Weapon’, in TV Paul, James Wirtz and Richard Harknett (eds.), The Absolute Weapon Revisited: Nuclear Arms and the Emerging International Order (Ann Arbor: Univ. of Michigan Press 1998), 47–72.
- Harknett, Richard, ‘Review of Brandon Valeriano, Benjamin M. Jensen, Ryan C. Maness, Cyber Strategy: The Evolving Character of Power and Coercion’ H-Net Reviews in Social Science, Oct. 2018, pp. 1–3
- Harknett, Richard J., ‘United States Cyber Command’s New Vision: What It Entails and Why It Is Important’, Lawfare, Mar. 2018. https://lawfareblog.com/united-states-cyber-commands-new-vision-what-it-entails-and-why-it-matters
- Hayden, Michael, Playing the Edge: American Intelligence in the Age of Terror (New York City: Penguin Random House 2016).
- Healey, Jason., ‘Beyond Attribution: Seeking National Responsibility for Cyber Attacks’, Issue Brief The Atlantic Council, 2012. https://www.fbiic.gov/public/2012/mar/National_Responsibility_for_CyberAttacks,_2012.pdf
- Healey, Jason and Karl Grindal, A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 (Washington DC: Cyber Conflict Studies Association 2013).
- Henderson, Scott J., The Dark Visitor: Inside the World of Chinese Hackers (FortLeavenworth, KS: Foreign Military Studies Office 2007).
- Hern, Alex., ‘WannaCry, Petya, NotPetya: How Ransomware Hit the Big Time in 2017’, The Guardian, 30 Dec. 2017. https://www.theguardian.com/technology/2017/dec/30/wannacry-petya-notpetya-ransomware
- Hollis, David M., ‘Cyberwar Case Study: Georgia 2008’, Small Wars Journal (6 January 2011), 1–10. https://smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf
- Inkster, Nigel, ‘China’s cyber power’, Adelphi Series, May 2016.
- Intrusion Truth, ‘APT3 Is Boyusec, a Chinese Intelligence Contractor’, 9 May 2017. https://intrusiontruth.wordpress.com/2017/05/09/apt3-is-boyusec-a-chinese-intelligence-contractor/
- Junio, Timothy J., ‘How Probable Is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate’, Journal of Strategic Studies 36/1 (2013), 125–33. doi:https://doi.org/10.1080/01402390.2012.739561.
- Kaspersky Lab, ‘Equation Group: The Crown Creator of Cyber-Espionage’, 16 Feb. 2015. https://www.kaspersky.com/about/press-releases/2015_equation-group-the-crown-creator-of-cyber-espionage
- Kaspersky Lab, ‘From Shamoon to Stonedrill: Wipers Attacking Saudi Organizations and Beyond’, 2017. https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180722/Report_Shamoon_StoneDrill_final.pdf
- Kaspersky Lab, ‘APT Logbook’. https://apt.securelist.com/#!/threats/
- Kello, Lucas, ‘Cyber Disorders: Rivalry and Conflict in a Global Information Age’, Presentation, International Security Program Seminar Series, Cambridge, Mass. International Security Program, Belfer Center for Science and International Affairs, Harvard Kennedy School, May 2012. http://www.belfercenter.org/publication/cyber-disorders-rivalry-and-conflict-global-information-age
- Kello, Lucas, ‘The Meaning of the Cyber Revolution: Perils to Theory and Statecraft’, International Security 38/2 (2013), 7–40. doi:https://doi.org/10.1162/ISEC_a_00138.
- Kello, Lucas, The Virtual Weapon and International Order (New Haven, CT: Yale University Press 2017).
- Knake, Robert K. ‘Placing the Office of Personnel Management Hack in Perspective’, Council on Foreign Relations, 15 Jun. 2015. https://www.cfr.org/blog/placing-office-personnel-management-hack-perspective
- Krekel, Bryan, George Bakos and Christopher Barnett, ‘The Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation’, Prepared for The US-China Economic and Security Review Commission, Northrop Grumman Corporation (2009).
- Krepinevich, Andrew F., ed., The Military-Technical Revolution: A Preliminary Assessment (Washington, D.C.: Center for Strategic and Budgetary Assessments, Office of Net Assessment 2002).
- Langner, Ralph., ‘Stuxnet: Dissecting a Cyberwarfare Weapon’, Security and Privacy 9/3 (2011), 49–51. doi:https://doi.org/10.1109/MSP.2011.67.
- Li, Zoe, ‘What We Know about the Chinese Army’s Alleged Cyber Spying Unit’, CNN, 20 May 2014. http://edition.cnn.com/2014/05/20/world/asia/china-unit-61398/index.html
- Libicki, Martin, Cyberwar and Cyberdeterrence (Santa Monica: RAND Corporation 2009). https://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf
- Libicki, Martin C., ‘Cyberspace Is Not a Warfighting Domain’ I/S A Journal of Law and Policy for the Information Society 8/2 (2012), 325–40. http://moritzlaw.osu.edu/students/groups/is/files/2012/02/4.Libicki.pdf.
- Liff, Adam P., ‘Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War’, Journal of Strategic Studies 35/3 (2012), 401–28. doi:https://doi.org/10.1080/01402390.2012.663252.
- Liff, Adam P., ‘The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux: Liff Responds to Junio’, Journal of Strategic Studies, 134–38.
- Lin, Herbert, ‘Attribution of Malicious Cyber Incidents: From Soup to Nuts’, Journal of International Affairs 70/1 ( Winter 2016), 75–138.
- Lin, Herbert, ‘Hacking a Nation’s Missile Development Program’, in Herbert Lin and Amy Zegart (eds.), Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations (Brookings Press 2018), 151–172.
- Lindsay, Jon, ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (2013), 365–404. doi:https://doi.org/10.1080/09636412.2013.816122.
- Lindsay, Jon, ‘The Impact of China on Cybersecurity: Fiction and Friction’, International Security 39/3 (2014/2015), 7–47. doi:https://doi.org/10.1162/ISEC_a_00189.
- Lindsay, Jon. R., ‘The Impact of China on Cybersecurity: Fiction and Friction’, International Security 39/3 (2014/2015), 7–47. doi:https://doi.org/10.1162/ISEC_a_00189.
- Lynn, William J, III, ‘Defending a New Domain: The Pentagon’s Cyberstrategy’, Foreign Affairs 89/5 ( September/October 2010), 97–108.
- Lynn, William J, III, ‘Defending a New Domain: The Pentagon’s Cyberstrategy’, Foreign Affairs 89/5 (2010), 13.
- Mahnken, Thomas G., ‘Cyber War and Cyber Warfare’’, in Kristin Lord and Travis Sharp (eds.), America’s Cyber Future: Security and Prosperity in the Information Age, Vol. 2 (Washington DC: CNAS 2011), 53–62.
- Matthew., Zook, Lomme Devriendt and Martin Dodge, ‘Cyberspatial Proximity Metrics: Reconceptualizing Distance in the Global Urban System’, Journal of Urban Technology 18/1 (January 2011), 93–114. doi:https://doi.org/10.1080/10630732.2011.578411.
- Maurer, Tim, Cyber Mercenaries: The State, Hackers, and Power (Cambridge: Cambridge University Press 2018).
- McConnell, Mike., ‘Cyberwar Is the New Atomic Age’, New Perspectives Quarterly 26/3 ( Summer 2009). doi:https://doi.org/10.1111/j.1540-5842.2009.01103.x.
- McGraw, Gary, ‘Cyber War Is Inevitable (Unless We Build Security In)’, Journal of Strategic Studies 36/1 (2013), 109–19. doi:https://doi.org/10.1080/01402390.2012.742013.
- Michael, Fischerkeller, Richard Harknett and Jelena Vicic, ‘The Limits of Deterrence and the Need for Persistence, in Aaron Brantly’, ( forthcoming: 2019)
- Monte, Matthew, Network Attacks and Exploitation: A Framework (Indianapolis: Wiley 2015).
- Morgan, Steve, ‘Global Ransomware Damage Costs Predicted To Exceed $5 Billion In 2017’, Cybersecurity Ventures, 18 May 2017. https://cybersecurityventures.com/ransomware-damage-report-2017-5-billion/
- Mozur, Paul, ‘China Appears to Attack GitHub by Diverting Web Traffic’, The New York Times, 30 Mar. 2015. https://www.nytimes.com/2015/03/31/technology/china-appears-to-attack-github-by-diverting-web-traffic.html
- Mulvenon, James C., ‘Chinese Cyber Espionage’, Testimony Before the Congressional-Executive Commission on China, 25 Jun. 2013. https://www.cecc.gov/sites/chinacommission.house.gov/files/CECC%20Hearing%20-%20Chinese%20Hacking%20-%20James%20Mulvenon%20Written%20Statement.pdf
- Newman, Lily Hay, ‘The Leaked NSA Spy Tool that Hacked the World’, Wired, 7 Mar. 2018. https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/
- Nissenbaum, Helen., ‘Where Computer Security Meets National Security’, Ethics and Information Technology 7/2 (2005), 61–73. doi:https://doi.org/10.1007/s10676-005-4582-3.
- NSA, ‘Iran - Current Topics, Interaction with GCHQ’, 12 Apr. 2013. https://www.eff.org/files/2015/02/21/20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf
- Olson, Party, ‘The Largest Cyber Attack in History Has Been Hitting Hong Kong Sites’, Forbes, 20 Nov. 2014. https://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/#dc0017b38f6e
- Panetta, Leon E., ‘Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City’, News Manuscript U.S Department of Defense, Oct. 2012. http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136
- Paulo, Shakarian, ‘The 2008 Russian cyber campaign against Georgia’, Military Review, Nov.–Dec., 2011, p. 63–64 doi:https://doi.org/10.1016/j.tvjl.2010.05.029.
- Perera, David and Joseph Marks., ‘Newly Disclosed Hack Got ‘Crown Jewels’’, Politico, 12 Jun. 2015. https://www.politico.com/story/2015/06/hackers-federal-employees-security-background-checks-118954
- Perlroth, Nicole., Amie Tsang and Adam Satariano., ‘Marriott Hacking Exposes Data of up to 500 Million Guests’, The New York Times, 30 Nov. 2018. https://www.nytimes.com/2018/11/30/business/marriott-data-breach.html
- Pollpeter, Kevin, ‘Chinese Writings on Cyberwarfare and Coercion’, in Jon R. Lindsay, Tai Ming Cheung and Derek S. Reveron (eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (Oxford: Oxford University Press 2015), 138–162.
- Posen, Barry, ‘Command of the Commons: The Military Foundation of U.S. Hegemony’, International Security 28/1 (2003), 5–46. doi:https://doi.org/10.1162/016228803322427965.
- President’s Commission on Critical Infrastructures, ‘Infrastructure Protection, Critical Foundations: Protecting America’s: The Report of the President’s Commission on Critical Infrastructure Protection’, 13 Oct. 1997. https://www.fas.org/sgp/library/pccip.pdf
- Rid, Thomas, ‘Cyber War Will Not Take Place’, Journal of Strategic Studies 35/1 (2012), 5–32. doi:https://doi.org/10.1080/01402390.2011.608939.
- Rid, Thomas., ‘Think Again: Cyberwar’, Foreign Policy, 27 Feb. 2012. http://foreignpolicy.com/2012/02/27/think-again-cyberwar
- Rid, Thomas, Cyber War Will Not Take Place (Oxford: Oxford University Press 2013).
- Rid, Thomas, ‘Is Cyberwar Real?’ in response to Jarno Limnéll Foreign Affairs’, Mar./Apr.
- Rovner, Joshua., ‘Cyber War as an Intelligence Contest’, War on the Rocks, 16 Sept. 2019. https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/
- Ruys, Tom, ‘Armed Attack’ and Article 51 of the UN Charter (Cambridge: Cambridge University Press 2010).
- Sanger, David, ‘Marriott Data Breach Is Traced to Chinese Hackers as US Readies Crackdown on Beijing’, New York Times, 11 Dec. 2018. https://www.nytimes.com/2018/12/11/us/politics/trump-china-trade.html
- Sanger, David. E., Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Crown 2012).
- Sanger, David. E and William J. Board, ‘Hand of U.S. Leaves North Korea’s Missile Program Shaken’, New York Times, 18 Apr. 2017. https://www.nytimes.com/2017/04/18/world/asia/north-korea-missile-program-sabotage.html
- Sanger, David. E and William J. Broad., ‘Trump Inherits a Secret Cyberwar against North Korean Missiles’, New York Times, 4 Mar. 2017. https://www.nytimes.com/2017/03/04/world/asia/north-korea-missile-program-sabotage.html
- Saydjari, Sami, ‘Defending Cyberspace’, Computer 35/12 (2002), 125–27. doi:https://doi.org/10.1109/MC.2002.1106187.
- Scott, James and Drew Spaniel., ‘China Espionage Dynasty: Economic Death by A Thousand Cuts’, Institute for Critical Infrastructure Technology, 28 Jul. 2016. http://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2016/2016.07.28.China_Espionage_Dynasty/ICIT-Brief-China-Espionage-Dynasty.pdf
- Segal, Adam, Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (New York: Public Affairs 2016).
- Segal, Adam, ‘How China Is Preparing for Cyberwar’, The Christian Science Monitor, 20 Mar. 2017. https://www.csmonitor.com/World/Passcode/Passcode-Voices/2017/0320/How-China-is-preparing-for-cyberwar
- Slayton, Rebecca, ‘What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment’, International Security 41/3 (2016/2017), 72–109. doi:https://doi.org/10.1162/ISEC_a_00267.
- Smeets, Max, ‘Organisational Integration of Offensive Cyber Capabilities: A Primer’, 2017 9th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2017.
- Smeets, Max, ‘A Matter of Time: On the Transitory Nature of Cyberweapons’, Journal of Strategic Studies 41–12 (2018), 6–32. doi:https://doi.org/10.1080/01402390.2017.1288107.
- Smeets, Max, ‘The Strategic Promise of Offensive Cyber Operations’, Strategic Studies Quarterly 12/3 ( Fall 2018), 90–113.
- Smeets, Max, ‘Integrating Offensive Cyber Capabilities; Meaning, Dilemmas, and Assessment’, Defence Studies 18/4 (2018), 395–410. doi:https://doi.org/10.1080/14702436.2018.1508349.
- Smeets, Max and Herbert S. Lin, ‘Offensive Cyber Capabilities: To What Ends?’in T. Minárik, R. Jakschisand L. Lindström (eds.), 2018 10th International Conference on Cyber Conflict (Tallinn: NATO CCD COE Publications 2018). https://ccdcoe.org/sites/default/files/multimedia/pdf/Art%2003%20Offensive%20Cyber%20Capabilities.%20To%20What%20Ends.pdf
- Smeets, Max and JD Work, ‘Operational Decision Making for Cyber Operations: In Search of a Model’, Cyber Defense Review (Forthcoming).
- Spykman, Nicholas J., America’s Strategy in World Politics: The United States and the Balance of Power (New York: Harcourt, Brace 1942), 393–94.
- Stephens, Bret. ‘The U.S.Military; like the French at Agincourt?’ New York Times, 25 Apr. 2019. https://www.nytimes.com/2019/04/25/opinion/us-military.html
- Sterling, Bruce, ‘E-spionage’, Wired, 12 Apr. 2008. https://www.wired.com/2008/04/e-spionage/
- Stirparo, Pasquale, David Bizeul, Brian Bell, Ziv Chang, Joel Esler, Kristopher Bleich, Maite Moreno, K A J. Monnappa, Paul Hutchinson Capmany, Boris Ivanov, Andre Gironda, Devon Ackerman, Carlos Fragoso, Eyal Sela and Florian Egloff, ‘APT Groups and Operations’. https://docs.google.com/spreadsheets/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/edit#gid=1864660085
- Stone, John, ‘Cyber War Will Take Place!’, Journal of Strategic Studies 36/1 (2013), 101–08. doi:https://doi.org/10.1080/01402390.2012.730485.
- Symantec Security Response, ‘The Shamoon Attacks’, Symantec Official Blog, 16 Aug. 2012. http://www.symantec.com/connect/blogs/shamoon-attacks
- Symantec Security Response, ‘Destover: Destructive Malware Has Links to Attacks on South Korea’, 3 Dec. 2014). https://www.symantec.com/connect/blogs/destover-destructive-malware-has-links-attacks-south-korea
- Symantec Security Response, ‘Buckeye Cyberespionage Group Shifts Gaze from US to Hong Kong’, 6 Sept. 2016. https://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong
- Symantec Security Response, ‘What You Need to Know about the WannaCry Ransomware’, Symantec Corporation, 23 Oct. 2017. https://www.symantec.com/blogs/threat-intelligence/wannacry-ransomware-attack
- Tikk, Eneken, Kadri Kaska, and Liis Vihul, Cyber Attacks Against Georgia (Tallinn: NATO CCDCOE 2008).
- Trivitt, Bill, ‘The Evolution of APTs (Advanced Persistent Threats), ’Information System Security Association. http://kern.issa.org/wp-content/uploads/2013/08/The-Evolution-of-APTsv12.pdf
- U.S. Cyberspace Policy Review, Ebert, Hannes and Tim Maurer, ‘Contested Cyberspace and Rising Powers’, Third World Quarterly 34/6 (2013), 1054–74. doi:https://doi.org/10.1080/01436597.2013.802502.
- Valeriano, Brandon and Ryan C. Maness, ‘The Dynamics of Cyber Conflict between Rival Antagonists, 2001–11’, Journal of Peace Research 51/3 (2014), 347–60. doi:https://doi.org/10.1177/0022343313518940.
- Valeriano, Brandon and Ryan C. Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System (New York: Oxford University Press 2015).
- Warner, Michael, ‘A Matter of Trust: Covert Action Reconsidered’, Studies in Intelligence 63/4 (2019), 33–41.
- Wendt, Alexander, Social Theory of International Politics (Cambridge: Cambridge University Press 1999).
- Wheaton, Kristan J. and Michael T. Beerbower, ‘Towards a New Definition of Intelligence’, Stanford Law & Policy Review 17/2 (April 2006), 319–20.
- The White House, ‘The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive’, White Paper, 22 May 1998, pp. 63. www.fas.org/irp/offdocs/paper598.h
- Yould, Rachel, ‘Beyond the American Fortress: Understanding Homeland Security in the Information Age’, in Robert Latham (ed.), Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security (New York, NY: The New Press 2003).
- Zetter, Kim, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (New York: Penguin Random House 2014).
- Zetter, Kim, ‘New Evidence Links a 20-Year-Old Hack on the US Government to a Modern Attack Group’, Motherboard, 3 Apr. 2017. https://motherboard.vice.com/en_us/article/vvk83b/moonlight-maze-turla-link